Amazon DVA-C01 Practice Test - Questions Answers, Page 11
List of questions
Question 101

A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol. What services can the Developer use to meet these requirements?
Explanation:
AWS documentation - Cognito MFA Managing Security
You can add multi-factor authentication (MFA) to a user pool to protect the identity of your users. MFA adds a second authentication method that doesn't rely solely on user name and password. You can choose to use SMS text messages, or time-based one-time (TOTP) passwords as second factors in signing in your users. You can also use adaptive authentication with its risk-based model to predict when you might need another authentication factor. It's part of the user pool advanced security features, which also include protections against compromised credentials.
Question 102

A game stores user game data in an Amazon DynamoDB table. Individual users should not have access to other users’ game dat a. How can this be accomplished?
Question 103

A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model.
Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?
Question 104

A supplier is writing a new RESTful API for customers to query the status of orders. The customers requested the following API endpoint. http://www.supplierdomain.com/status/customerID Which of the following application designs meet the requirements? (Select two.)
Question 105

A development team consists of 10 team members. Similar to a home directory for each team member the manager wants to grant access to user-specific folders in an Amazon S3 bucket. For the team member with the username “TeamMemberX”, the snippet of the IAM policy looks like this:
Instead of creating distinct policies for each team member, what approach can be used to make this policy snippet generic for all team members?
Explanation:
> https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_variables.html > UseAWS Identity and Access Management (IAM) policy variables as placeholders when you don't knowthe exact value of a resource or condition key when you write the policy.
Question 106

A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API Gateway. Which technique will accomplish this?
Explanation:
https://blog.codecentric.de/en/2016/12/serverless-soap-legacy-api-integration-java-aws-lambdaaws-api-gateway/
Question 107

A company is using AWS CodeBuild to compile a website from source code stored in AWS CodeCommit. A recent change to the source code has resulted in the CodeBuild project being unable to successfully compile the website. How should the Developer identify the cause of the failures?
Question 108

A web application is using Amazon Kinesis Streams for clickstream data that may not be consumed for up to 12 hours. How can the Developer implement encryption at rest for data within the Kinesis Streams?
Explanation:
https://docs.aws.amazon.com/streams/latest/dev/what-is-sse.html
https://aws.amazon.com/about-aws/whats-new/2017/07/amazon-kinesis-streams-introducesserver-side-encryption/
Question 109

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.
Which of the following could create this situation? (Select two.)
Question 110

A Developer executed a AWS CLI command and received the error shown below:
What action should the Developer perform to make this error human-readable?
Explanation:
https://docs.aws.amazon.com/cli/latest/reference/sts/decode-authorization-message.htmlThe message is encoded because the details of the authorization status can constitute privileged information that the user who requested the operation should not see. To decode an authorization status message, a user must be granted permissions via an IAM policy to request the DecodeAuthorizationMessage (sts:DecodeAuthorizationMessage ) action.
Question